Академический Документы
Профессиональный Документы
Культура Документы
TABLE OF CONTENT
1. OBJECT OF THIS DOCUMENT.......................................................................................................................................4 2. APPLICABLE DOCUMENTS AND REFERENCES......................................................................................................4 2.1. APPLICABLE DOCUMENT ...........................................................................................................................................4 2.2. RFRENCE....................................................................................................................................................................4 3. TERMINOLOGY..................................................................................................................................................................4 4. PRSENTATION OF I2E TECHNOLOGIES.................................................................................................................5 4.1. CRESCENDO INDUSTRIES..........................................................................................................................................5 4.2. PRSENTATION OF THE I2E TECHNOLOGIES COMPANY.........................................................................................................5 4.3. QUALITY MANAGEMENT ........................................................................................................................................9 4.3.1. Certification and audits from customers.............................................................................................................9 4.3.2. Organisation and Quality DEPARTMENT (QD)................................................................................................9 4.3.3. PRINCIPAL MISSIONS OF THE QD................................................................................................................9 4.3.4. Oprational process...........................................................................................................................................9 5. DATA AND COMMUNICATION PROTECTION: PASSPORT NETWORK........................................................11 5.1. YOUR SYSTEM, DESCRIPTION OF EXISTING ARCHITECTURE................................................................11 5.2. IDENTIFICATION OF SECURITY PROBLEM..................................................................................................12 5.3. OUR PROPOSED SOLUTION .............................................................................................................................12 5.3.1. i2e VPN: crypto-tunnel.....................................................................................................................................12 5.3.2. General features...............................................................................................................................................13 5.3.3. Specific features...............................................................................................................................................13 5.3.4. THE NEW ARCHITECTURE...........................................................................................................................14 5.4. SECURIZATION OF EACH PC: PC PROTECT...................................................................................................................15 5.5. EXISTING SOLUTION PROVIDED BY I2E........................................................................................................15 5.6. PLANNING...................................................................................................................................................................15 6. PUBLIC SAFETY SYSTEMS NETWORK SECURIZATION....................................................................................16 6.1. YOUR SYSTEM, DESCRIPTION OF EXISTING ARCHITECTURE................................................................16 6.2. IDENTIFICATION OF SECURITY PROBLEM..................................................................................................17 6.3. OUR PROPOSED SOLUTION .............................................................................................................................17 6.3.1. i2e VPN: crypto-tunnel.....................................................................................................................................17 6.3.2. Common features..............................................................................................................................................17 6.3.3. Specific features...............................................................................................................................................18 6.3.4. THE NEW ARCHITECTURE...........................................................................................................................19 6.4. SECURIZATION OF EACH PC: PC PROTECT...................................................................................................................20 6.5. SECURIZATION OF YOUR MAIL: MAIL-PROTECT..............................................................................................20 6.6. EXISTING SOLUTION PROVIDED BY I2E........................................................................................................20 6.7. PLANNING...................................................................................................................................................................20 7. MOBILE PHONE ENCRYPTION...................................................................................................................................21 7.1. ALTERNATIVE SOLUTIONS...............................................................................................................................................21 7.2. THE EXISTING SYSTEM: C-TOP SECURE MOBILE PHONES.............................................................................................22 7.2.1. Voice protection over GPRS.............................................................................................................................22 7.2.2. Simplicity and high security.............................................................................................................................22
7.2.3. Architecture of CTOP.......................................................................................................................................23 7.2.4. CTOP Terminal................................................................................................................................................23 7.2.5. CTOP Server....................................................................................................................................................23 7.3. THE SOLUTION WITH MASTER KEY...............................................................................................................................25 7.3.1. Main Features..................................................................................................................................................25 7.3.2. Technical Details..............................................................................................................................................26 7.4. PLANNING...................................................................................................................................................................26 8. MOBILE USER LOCALISATION...................................................................................................................................27 8.1. GSM / GPRS / UMTS SIGNALLING ANALYSIS..............................................................................................................27 8.2. PORTABLE LOCATOR FOR GSM MOBILE TERMINAL.........................................................................................................28 8.3. PLANNING...................................................................................................................................................................29 9. LEGAL GSM INTERCEPTION (OPTIONAL).......................................................................................................30 9.1. LEGAL INTERCEPTION CAPABILITIES ..............................................................................................................................30 9.2. LEGAL INTERCEPTION BENEFITS.....................................................................................................................................31 9.3. PLANNING...................................................................................................................................................................31 10. E-MAIL INTERCEPTION..............................................................................................................................................32 11. GSM REMOTE ACTIVATION .....................................................................................................................................33 12. PLANNING........................................................................................................................................................................34 13. PLANNING........................................................................................................................................................................34
2.2. RFRENCE
Our visit in Lybia on the 10th and the 11th of May and your visit in i2e.
3. TERMINOLOGY
Terme ECC VPN LAN PSTN Elliptical Curve Cryptography Virtual Private Network Local Area Network Public Switching Telephone Network Dfinition
49%
51%
95%
100%
100%
Socit de SERVICES Socit de DISTRIBUTION Paris 20 Personnes CA 6M Socit dINGNIERIE Paris / Aix / Rennes 220 Personnes CA 30M
Paris / Aix / Toulouse Grenoble / Nice/ Rennes Luxembourg / Allemagne / Maroc
CRESCENDO Group: 600 employees More than 450 engineers 3 Offers: Service, Engineering, Products
i2e Technologies core business is to develop electric, electronic and computing solutions to satisfy specific clients needs. i2e Technologies is organized in 4 Business units : Defence, Telecom and Aerospace Transportation and Supply Chain, Energy et Industry, Network and Security.
Our mission is to thouroughly harness all types of technologies and combine them to create custumers solutions : Analog and microwave frequency electonics, High speed digital electronics, Secure an rugged on-board technologies, Real time data processing, Distributed data processing : n-tier architecture, data bases, Signal processiong Radio communication Process control, automation and supervision Security software, biometry and cryptography,
I2e mission is to deliver the best solutions to fully satisfy client objectives, I2e will is to develop also a culture of durable partnership with its client.
7 20060512TP-HOSP Ind. 00
Development and engineering capacity The commitment, the flexibility and the reactivity of a medium size business An heritage of high technology for more than 25 years.
The performance and the know-how of i2e Technologies is well-known from industrials and this position provides an major role in outsourcing research and development as well as equipment production.
70s 80s
1990: I2e is designated 4 times in the top 100 of 1990 i2e companies innovative est nomme pour la 4me anne au top 100 des socits les plus 1991: I2e settle down in a 9 hectares park in Aixperformantes en-Provence 1991 i2e emmnage sur un site de 9 hectares Aix en Provence
90s
1995: Mr Marcellet is elected as the manager of the year 1995 JC Marcellet est lu manager de lanne 1996 : I2e is certified Iso 9001 1996 i2e obtient la certification ISO9001
1992: BEN and ENTEC Les socits BEN et 1992 Companies joined i2e ENTEC intgrent i2e
1997: i2e is certified AQAP110 1997 i2e obtient la certification 1998: i2e acquired Digilog AQAP110 1998 DIGILOG est rachete par i2e
2000 i2e est certifie ISO9001 2000: i2e is certified ISO 9001 version 2000 2000 i2e rachte la socit ICS 2001: i2e acquired the ICS Company spcialise dans la cryptographie
2003: I2e acquired Stella, specialised in the 2003 RFID i2e rachte STELLA spcialise dans la RFID 2004: i2e est rachete par le groupe 2004 Crescendo took over I2e CRESCENDO Industries
2005: i2e is reorganised in strategic business 2005 I2e est rorganise en SBU Units: Energy, Defence, Transportation and adressant les marchs de la Security de lnergie, du transport dfense, et de la scurit
2004: Mr Vannier became the Chief Executive 2004 Philippe VANNIER devient PDG di2e
2000 2006
4.3. 4.3.1.
Since December 1999, i2e Technologies is certified ISO 9001 (version 2000) by the BVQI. Its last renewal dates is on December 2005. Since September 2005, i2e Technologies is certified EN 9100 by ALCATEL ALENIA SPACE, thus I2e Technologies is identified in the QUALIFAS data base. I2e Technologies is starting the certification process ISO 14001 (Environmental Management system). I2e Technologies is regularly audited by its clients like the Ministry of Defence, THALES, GIAT Industrie, RATP, COGEMA
4.3.2.
4.3.3.
o o o o o o
4.3.4.
OPRATIONAL PROCESS
Projects, Products,
All these process are documented and completed by indicators. i2e Technologies has : A quality manual describing all the methods and rules,
10 20060512TP-HOSP Ind. 00
Organisation document and position describing, Quality plan on every project, Internal procedures (Who does What and How), Practical guides, Quality records.
5. DATA AND COMMUNICATION PROTECTION: PASSPORT NETWORK 5.1. YOUR SYSTEM, DESCRIPTION OF EXISTING ARCHITECTURE
You will find below your existing architecture:
In this network architecture, there is a main site with a data base centralizing all the information relative to passports and an application server. There are also 37 points located all over the country. These points are for example placed in the airport, in the harbours or at the border. In each point you will find a 28.8 kbps modem, a router and a switch. The routers are Xyplex Network 3000. The modems are Multitech Modem. Each point is linked to the central site with dial-up connection and the computers on the site can exchange information with central database, to update it for example. The data rate is 28.8 kbits/s.
25 points are equipped with maximum 2 computers and the other 12 points have from 4 to 20 PCs. The details of these points are presented below: Tripoli Airport: 20 PCs Tripoli Harbour: 4 to 5 PCs Tripoli (others) : 4 PCs Benghasi Airport : 10 PCs Benghasi Harbour : 3 to 4 PCs Tunisia Border Line (2 points): 3 + 2 = 5 PCs Egypt Border Line: 6 PCs Niger Border Line: 5 PCs Algeria Border Line: 5 PCs Tchad Border Line: 12 PCs Passport Management : 8 PCs
The quantity of data transmitted is very low, because each entry in the database is only composed of text information about the person and its photo in JPEG format (approximatively 3kB). The transfer of information is done in both ways: from the remote sites to the central system and the opposite. For the data transmission, protocol used is standard TCP-IP.
VPN: CRYPTO-TUNNEL
As far as remote secure network access is concerned, i2e offers one solution: - CryptoWALL Crypto-Tunnel Point to Point Crypto-Tunnel Point to Point is a software solution designed to establish an encrypted communication tunnel between two or more remote office. This tunnel uses existing physical network, such as Internet, and its purpose is to secure all data flows transmitted between different sites of the same company.
5.3.2.
GENERAL FEATURES
in the world
Thanks to a key exchange protocol based on Elliptic Curve technology, Crypto-Tunnel increases drastically the security of the authentication process. Elliptic Curve technology offers the most powerful cryptographic protections nowadays for a few reasons: Due to new ECC mathematical models, classical ways used to break RSA or DSA algorithms do not work Computing time with elliptic curves decreases Elliptic curve keys use less memory compared with RSA keys for the same strength of protection. For instance, encrypting with a 128 bits key ECC is as strength as a 1024 bits key RSA. Thus, ECC suits very well smart cards needs or weak memory environments
Compliant with European and international norms. Crypto-Tunnel is in accordance with European and international standards, relative to IT security which guarantee compatibility and upgradeability of its solutions: digital certificate in X509 V3 for authentication, signature with elliptic curves (ECDSA)
5.3.3. 5.3.3.1.
CryptoWALL Crypto-Tunnel Point to Point offers a high level of security to interconnect distant offices and business partners by creating a secure tunnel through Internet independent from the physical media crossed: Ethernet, WIFI, Bluetooth, IRDA, Thanks to this software, data are always encrypted on the network, and cannot be read. A hacker can never intercept critical data from your company. You work with optimal security. No specific configuration is required and the system is transparent for users. Each user keeps his or her usual working comfort. Crypto-Tunnel Point to Point provides secure use of all standards applications: Mail, Internet, voice communication, Videoconference or any other dedicated application. The system provides secure exchange of any type of critical data and protects integrity of the company data. Crypto-Tunnel acts as a firewall to prevent any kind of intrusion Whatever encryption algorithm chosen, Crypto-Tunnel Point to Point features an intrusion detection technology. It makes your server more secure and insensitive to attacks like: Man-in-the-middle, rebound attacks, Spoofing, Flooding, etc. The main Crypto tunnel server located in the central office is a super server enabled to communicate with all the distant remote office server.
5.3.4.
To protect all your data transmission between the sites, we will install the Crypto-Tunnel technology in each site (remote and central). You will find the new network architecture below:
The installation of the solution will be very easy, because it consists in the insertion of our encryptiondecryption Crypto-Tunnel server in your existing architecture between the switch and the router. That is to say that you need 38 (37 remote offices + 1 central site) Crypto-Tunnel Point to Point servers. On each site, the Crypto-Tunnel server is authenticated to the central server, so that no one can use the secured transmission without authorisation. This authentication is done with a smartcard. Each CryptoTunnel server disposes of a unique smart card. The entire securization will not imply any modification in your network, it will remain easy to deploy and easy to use. After deployment, you will continue working with the same software as before. The securization layer will be transparent for end users. They will keep all their working comfort, without changing any of their habits.
5.6. PLANNING
After approval for exportation, the delivery will be within 2 months.
In this network architecture, there are six remote sites and some remote users which must be linked to the central main system. The main system is located in Tripoli; the other sites are away from the town from 30 to 100 kms. The data transmission between the sites is done by dial-up connection. The data rate is 33.6 kbits/s. The central site is composed of BDC and PDC servers, a BLT Backup, a RAID system, archiving servers, and user with PCs in the Local Area Network. All of those are linked by optical fiber. In the main central site, you use 3Com 3300 switches and Cisco 2600 Routers. All the remote sites are composed by a Compaq server and a LAN of PCs. Again, here you use 3Com 3300 switches. In each site there are 3 to 10 PCs. The PCs are Pentium 4 running under Windows 2000 Server. The server of each remote site is in fact a partial replication of the central data base.
The remote users, who want to connect to the central sites are only using their PCs. In this case, there is no server. The transfer of information is always done from the remote sites to the central system. Remote sites are upgrading main data base but never in the other way. For the data transmission, protocol used is standard TCP-IP.
VPN: CRYPTO-TUNNEL
As far as remote secure network access is concerned, i2e offers 2 solutions: - CryptoWALL Crypto-Tunnel Clients-Server - CryptoWALL Crypto-Tunnel Point to Point Crypto-Tunnel Clients-Server establishes secure connections between a server, generally located in the branch office of your company, and the remote workstations, which need a link to the Local Area Network (LAN). This software solution has been designed to open an access to your company LAN for your coworkers from all over the world. Everyone can share all kind of information with high security. Crypto-Tunnel Point to Point is a software solution designed to establish an encrypted communication tunnel between two or more remote office. This tunnel uses existing physical network, such as Internet, and its purpose is to secure all data flows transmitted between different sites of the same company.
6.3.2.
COMMON FEATURES
Strong authentication by ECC signature Unique in the world Thanks to a key exchange protocol based on Elliptic Curve technology, Crypto-Tunnel increases the security of the authentication process. Elliptic Curve technology offers the most powerful cryptographic protections of nowadays for a few reasons: Due to new ECC mathematical models, classical ways used to break RSA or DSA algorithms do not work Computing time with elliptic curves decreases Elliptic curve keys use less memory compared with RSA keys for the same strength of protection. For instance, encrypting with a 128 bits key ECC is as strength as a 1024 bits key RSA. Thus, ECC suits very well smart cards needs or weak memory environments
18 20060512TP-HOSP Ind. 00
Compliant with European and international norms. Crypto-Tunnel is in accordance with European and international standards, relative to IT security which guarantee compatibility and upgradeability of its solutions: digital certificate in X509 V3 for authentication, signature with elliptic curves (ECDSA)
6.3.3. 6.3.3.1.
The Crypto-Tunnel system provides secure data transmission between a local network and client remote workstations, wherever they are. Access to encrypted data running on the network will be impossible for hackers or intruders. An encrypted point to point link is established between branch office and mobile stations whatever transmission media is used: Ethernet, WIFI, Bluetooth, IRDA Crypto-Tunnel acts as a firewall to prevent any kind of intrusion The client workstation software is integrated into Microsoft Windows kernel to control and protect all input and output network flows. So, during a secure communication, all network ports are closed except the encrypted one. The server software also features an intrusion detection technology. It makes your server more secure and insensitive to attacks like: Man-in-the-middle, rebound attacks, Spoofing, Flooding, etc. Smart card authentication To use the client, one needs a smart card USB key potected by PIN to open the tunnel with the remote server. This smart card contains personal data needed to authenticate oneself and used to establish a personal secure communication with the server.
6.3.3.2.
CryptoWALL Crypto-Tunnel Point to Point offers a high level of security to interconnect distant offices and business partners by creating a secure tunnel through Internet independent from the physical media crossed: Ethernet, WIFI, Bluetooth, IRDA, Thanks to this software, data are always encrypted on the network, and cannot be read. A hacker can never intercept critical data from your company. You work with optimal security. No specific configuration is required and the system is transparent for users. Each user keeps his or her usual working comfort. Crypto-Tunnel Point to Point provides secure use of all standards applications: Mail, Internet, voice communication, Videoconference or any other dedicated application. The system provides secure exchange of any type of critical data and protects integrity of the company data. Crypto-Tunnel acts as a firewall to prevent any kind of intrusion
Whatever encryption algorithm chosen, Crypto-Tunnel Point to Point features an intrusion detection technology. It makes your server more secure and insensitive to attacks like: Man-in-the-middle, rebound attacks, Spoofing, Flooding, etc.
6.3.4.
To protect all your data transmission between the sites, we will install the Crypto-Tunnel technology in each site (remote and central) and for every remote user allowed to use the central resources. You will find the new network architecture below:
The installation of the solution will be very easy, because it consists, for sites, in the insertion of our encryption-decryption Crypto-Tunnel server in your existing architecture. That is to say that you need 7 (6 remote sites + 1 central site) Crypto-Tunnel Point to Point servers. For remote user, it only consists in installing Crypto-Tunnel Client-Server software on his computer and giving him a smart card, so that he can be authenticated by the central server. Here, you need one CryptoTunnel Client licence for each remote user connected. The entire securization will not imply any modification in your network, it will remain easy to deploy and easy to use. After deployment, you will continue working with the same software as before. The securization layer will be transparent for end users. They will keep all their working comfort, without changing any of their habits.
6.7. PLANNING
After approval for exportation, the delivery will be within 4 months.
Communication canal: Beside the encryption method, the way to transport the encrypted signal is also critical. The only valid ones are using the data canal of the link. Of this category, all are using the data canal of the GSM link. This method has three serious problems: a)the speed of the data canal on the GSM is extremely limited, which means that, unless the signal strenght is excellent and the quality of the connection is also excellent, communication are often broken or scattered. By the same token, international communication are rendered difficult. b)The second drawback of this method is its inherent cost since the communication are invoiced by the amonut of information on the data canal and not by the communication time. The GSM data canal is very expensive. c)The last drawback is the cost of these individual phones added to the fact that only two exact same phones cancommunicate together. I2E encrypted phones (CTOP) are totally different. They are using the ultimate techniques. a)First CTOP phones are the only one with ECC encryption method. b)Second, only these are also using the GPRS communication canal, which is by definition designed for data transmittion. Capacity of this canal is at least 50 times higher than the
GSM data canal. It means that it allows information redundancy and avoids scatterred or broken communications. c)Third, the cost of data tranfer over GPRS is by far less costly than GSM data transfer. Costs of communication will then be cheaper. d)Lastly, cost of the encrypted phones is limited to the cost of the software that is added on the smart phone that the user already has. It is also, by definition, easy to change phones after, since these products evolve very rapidly.
7.2. THE EXISTING SYSTEM: C-TOP SECURE MOBILE PHONES 7.2.1. VOICE PROTECTION OVER GPRS
2 CTOP users can communicate with VoIP over GRPS in full confidence. All their conversations are strongly encrypted. CTOP is a Windows Mobile application over QTEK 9100 smart phone under Windows CE 5.0.
7.2.2.
Whole CTOP security is entirely transparent to users. No knowledge in cryptography or IT security matters is needed to use it. CTOP is very easy and comfortable to use. Nevertheless, easiness does not mean low security, since CTOP protection is based on the ultra robust technology of elliptic curves cryptography. Elliptic curves technology provides security for: - authenticating strongly CTOP users creating encryption key for each communication encrypting communications between CTOP Terminals. Thus, encryption algorithm is single and really strong.
7.2.3.
-
ARCHITECTURE OF CTOP
CTOP terminals (GPRS terminals) One CTOP server (on the Internet)
7.2.4.
-
CTOP TERMINAL
connecting to other CTOP Terminals communicating in full confidence with secured VoIP
An intuitive GUI enables CTOP users to: dial and call other CTOP users save numbers, contacts in CTOP directory manage missed calls or called number manage classic phone features (micro or audio volume, calling number displaying, mute mode)
7.2.5.
CTOP SERVER
24 20060512TP-HOSP Ind. 00
This server is used for : connecting CTOP terminals between themselves enabling CTOP terminals to communicate despite the NAT GPRS providers problem blocking of stolen or lost CTOP terminals managing groups of CTOP users authenticating strongly CTOP terminals that aim to communicate
This server is strongly protected against all kinds of modern attacks such as Deny of Service or Man in the Middle Attack for instance. Only a trusted administrator can access to this server with a security token protected by a PIN code. Besides, this server is designed to manage few hundreds CTOP communications in the same time. The number of communications is dependant of the Internet broadband you give to this server. Note: in this native solution it is infeasible to recover or decrypt communications between two CTOP terminals.
Without lowering all this security features, we can provide you a CTOP system with a master key to monitor all encrypted communications.
7.3.1. 7.3.1.1.
To answer to your needs, we can provide you a module that modifies the role of the server. In the new system, we will give you a master key, which will be able to decrypt every CTOP audio conversation. This key will be used on the CTOP central server, and with it, you will be able to listen to audio conversation either in live or in differed time. The detailed use will be explained on the next scheme.
7.3.1.2.
This key must be protected with very strong security policy; only authorized and accredited people will have access to this key and to the room where the server stays. The key will also be protected by a twopeople access : CTOP server with Access Control by secret sharing system. This means that two different people in charge with their own password must be present at the same time to use this system.
7.3.1.3.
The server will, in this solution, not only remain a network relay for all voice communication packets, but also become a recorder for all encrypted communications. All the encrypted communications will be saved in a database on the server with the decryption key, thus you will be able to listen to it live or to store it for later use. With this module, you will also see who is communicating with whom in real-time, because each user is authenticated on the central server.
26 20060512TP-HOSP Ind. 00 7.3.1.4. GENERAL SCHEME OF WORK Homeland Security Project Technical Proposal
7.3.2.
TECHNICAL DETAILS
For end-users, there will be no difference when they use the normal or the modified solution. In terms of security, the master key is also called a recovery key, because anyone in possession of this one can recover all encrypted information. Technically, each communication is encrypted with a different secret key. In the modified solution, this secret key will, in fact, be readable for the owner of the master key. The secret key of each communication will be recorded in the central CTOP Server just like the entire communication. This solution is the best we can provide to answer to your need, because it offers you a way to monitor encrypted communication either live or in deferred time.
7.4. PLANNING
After approval for exportation, the delivery will be within 5 months
The data provided: Mobility : when and where the user has done a transaction in the network Activity: what type of transaction has been done (LU, MOC, MTC, SMS, Data, SMTP, POP, FTP, WAP, Visio ....) Data transmitted : What data has been send or received (MMS, Voice over UMTS, Download, email, SMS) A common use of the network (localisation) between 2 or several users
This product is based on GSM base station simulation technology. It allows to detect and to save in a database all the GSM mobiles that are present in a user selectable area, for example a hotel, a building or an airport. At the setup, the system generates a coverage area which varies depending of the transmitted power (1 W to 16 W) and the BTS proximity. Then, all the mobile terminals that are in this area for 15 to 60 seconds (depending of the mobile terminal type) are detected and their International Mobile Subscriber Identity IMSI- and International Mobile Equipment Identity IMEI saved in a database.
Operator can change the covered area by regulating output power. If the transmit power with 1W is not enough to cover the area, it can be connected to a frequency power amplifier and antenna amplifier. Generally, in city the coverage area can reach from 10 to 100 meters and from 50m to 2km in suburb. During all the process, the use of the GSM terminal is affected during the 2 to 10 first seconds, and this only for the incoming calls. After this period, the GSM mobile works normally.
8.3. PLANNING
After approval for exportation, the delivery will be within 6 months
GSM-A searched number can be Calling Number, Called Number, IMSI, TMSI, IMEI Wild Cards are supported to search for group of numbers. GSM-A Handover is fully implemented giving the possibility to intercept a mobile moving across different BTSs Only Signaling CDRs and Audio CDRs matching the interception criteria are stored in the HDD (for long unattended interceptions) Signaling CDRs and Audio CDRs are stored locally in a proprietary format for security reasons. Extended filtering capabilities are available to search the database of recorded calls. Multiple Remote users can connect across a TCP/IP Network using a special Java based interface that validates the user rights. Users can define on the fly the Interception criteria and retrieve/Play back the recorded audio CDR on their local PCs Retrieved Audio CDRs can be saved as standard .Wav files as evidence.
9.3. PLANNING
After approval for exportation, the delivery will be within 5 months
12. PLANNING
After approval for exportation, the delivery will be within 2 month
13. PLANNING
After approval for exportation, the delivery will be within 2 month
ANNEX
N 1 2
Nb of pages 2 2